Completed
Encoding state in packets instead of storing it in devices
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
NetHide - Secure and Practical Network Topology Obfuscation
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Link flooding attacks (LFA) target the infrastructure
- 3 Learning large topologies by combining many path measurements
- 4 Reactive and proactive strategies to mitigate link-flooding attacks
- 5 Topology obfuscation as an optimization problem
- 6 A topology is robust against LFAS if the flow density of each link does not exceed is capacity
- 7 Two basic strategies for attacking the virtual topology despite obfuscation
- 8 Accuracy and utility measure the closeness of P and V
- 9 NetHide optimizes over a random sample of solutions to improve performance and security
- 10 Maintaining the utility of debugging tools requires sending packets through the actual network
- 11 Programmable network devices allow modifying tracing packets at line rate
- 12 Encoding state in packets instead of storing it in devices
- 13 High protection with small impact on accuracy and utility
- 14 NetHide: Secure and Practical Network Topology Obfuscation